Countering JPEG anti-forensics based on noise level estimation

被引:4
作者
Zeng, Hui [1 ]
Yu, Jingjing [1 ]
Kang, Xiangui [1 ]
Lyu, Siwei [2 ]
机构
[1] Sun Yat Sen Univ, Sch Data & Comp Sci, Guangdong Key Lab Informat Secur, Guangzhou 510006, Guangdong, Peoples R China
[2] SUNY Albany, Dept Comp Sci, Albany, NY 12222 USA
基金
中国国家自然科学基金;
关键词
game theory; quantization artifact; blocking artifact; JPEG forensics; anti-forensics; noise level estimation; COMPRESSION; IDENTIFICATION; FORGERIES; IMAGES; GAME;
D O I
10.1007/s11432-016-0426-1
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Quantization artifact and blocking artifact are the two types of well-known fingerprints of JPEG compression. Most JPEG forensic techniques are focused on these fingerprints. However, recent research shows that these fingerprints can be intentionally concealed via anti-forensics, which in turn makes current JPEG forensic methods vulnerable. A typical JPEG anti-forensic method is adding anti-forensic dither to DCT transform coefficients and erasing blocking artifact to remove the trace of compression history. To deal with this challenge in JPEG forensics, in this paper, we propose a novel countering method based on the noise level estimation to identify the uncompressed images from those forged ones. The experimental results show that the proposed method achieves superior performance on several image databases with only one-dimensional feature. It is also worth emphasizing that the proposed threshold-based method has explicit physical meaning and is simple to be implemented in practice. Moreover, we analyze the strategies available to the investigator and the forger in the case of that they are aware of the existence of each other. Game theory is used to evaluate the ultimate performance when both sides adopt their Nash equilibrium strategies.
引用
收藏
页数:14
相关论文
共 34 条
[1]  
[Anonymous], 2011, P INT WORKSH DIG WAT
[2]  
[Anonymous], 2013, P 20 NETWORK DISTRIB
[3]   The Source Identification Game: An Information-Theoretic Perspective [J].
Barni, Mauro ;
Tondi, Benedetta .
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2013, 8 (03) :450-463
[4]  
Bas P., 2011, P 13 INF HID C PRAG, V6958, DOI 10.1007/978-3-642- 24178-9_5
[5]  
Bianchi T, 2011, INT CONF ACOUST SPEE, P2444
[6]  
Fan W., 2013, P IH MMSEC 2013 2013, P117, DOI [10.1145/2482513.2482536, DOI 10.1145/2482513.2482536]
[7]   Identification of bitmap compression history: JPEG detection and quantizer estimation [J].
Fan, ZG ;
de Queiroz, RL .
IEEE TRANSACTIONS ON IMAGE PROCESSING, 2003, 12 (02) :230-235
[8]  
Farid H., 2008, TR2006583
[9]   Exposing Digital Forgeries From JPEG Ghosts [J].
Farid, Hany .
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2009, 4 (01) :154-160
[10]  
Fu D., 2007, P SPIE EL IM SEC STE